Secrecy-based channel assignment for device-to-device communication: An auction approach

Device-to-device (D2D) communication has revealed great potential to satisfy the soaring wireless data demands. As a key point, interference management should be carefully investigated. Different from the view that D2D transmissions cause harmful interference to cellular communication when reusing the same channels, we deem such interference as a kind of spontaneous interference against eavesdropping and use this interference to guarantee the secrecy capacity of cellular communication. Hence D2D pairs could have their own D2D transmission without violating secrecy-based cellular communication. Also, we utilize secrecy outage probability to overcome the difficulty in accurately obtaining channel gains at the eavesdropper. On the other hand, we take the advantage of auction algorithm to derive the channel assignment policy, such that multiple D2D pairs are assigned different channels with low complexity. Simulation results demonstrate that our algorithm works well and converges quickly.

[1]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[2]  B. Aazhang,et al.  Cellular networks with an overlaid device to device network , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[3]  Yanzan Sun,et al.  Uplink Interference Mitigation for OFDMA Femtocell Networks , 2012, IEEE Transactions on Wireless Communications.

[4]  Sami Hakola,et al.  The investigation of power control schemes for a device-to-device communication integrated into OFDMA cellular system , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[5]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[6]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[7]  Michael L. Honig,et al.  Auction-Based Spectrum Sharing , 2006, Mob. Networks Appl..

[8]  Xinping Guan,et al.  Flow rate control and resource allocation policy with security demands in OFDMA networks , 2012, Proceedings of the 10th World Congress on Intelligent Control and Automation.

[9]  Tao Han,et al.  Uplink channel reusing selection optimization for Device-to-Device communication underlaying cellular networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[10]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[11]  Mansoor Shafi,et al.  The Effects of Limited Channel Knowledge on Cognitive Radio System Capacity , 2013, IEEE Transactions on Vehicular Technology.

[12]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[13]  C.-H. Yu,et al.  Power Optimization of Device-to-Device Communication Underlaying Cellular Communication , 2009, 2009 IEEE International Conference on Communications.

[14]  Zhu Han,et al.  Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[15]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[16]  Zhu Han,et al.  Interference-aware resource allocation for device-to-device communications as an underlay using sequential second price auction , 2012, 2012 IEEE International Conference on Communications (ICC).

[17]  Dimitri P. Bertsekas,et al.  Auction Algorithms , 2009, Encyclopedia of Optimization.

[18]  Xiaodong Wang,et al.  An Auction Approach to Resource Allocation in Uplink OFDMA Systems , 2009, IEEE Transactions on Signal Processing.

[19]  Ari Hottinen,et al.  Energy-efficient device-to-device MIMO underlay network with interference constraints , 2012, 2012 International ITG Workshop on Smart Antennas (WSA).

[20]  Xin-Ping Guan,et al.  Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).

[21]  Youyun Xu,et al.  Resource allocation for cognitive networks with D2D communication: An evolutionary approach , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[22]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[23]  Xinbing Wang,et al.  Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[24]  Han Han,et al.  Device-to-Device communication in CDMA-based cellular systems — Uplink capacity analysis , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.